Latest
Nillion Raises USD 25 M for Trust-sensitive Computation Network
Diffblue Raises USD 6.3 M to Enable Generating Unit Tests for Java
Elon Musk’s xAI to Reportedly Raise Additional Funds on USD 40B
OpenAI Joins Forces with Broadcom and TSMC to Build New AI Chips
Meta is Planning to Incorporate Custom Search Engine into Chatbot
Armis Raises USD 200 M Round at USD 4.2B Valuation
Sierra Technologies Raises USD 175 M at USD 4.5 B Valuation
Concentric Raises USD 45 M to Enhance its AI-based Data Cataloging
Bluesky Raises USD 15 M for Developer Ecosystem and New Features
Payment Processing Startup Finix Raises 75 M in Funding
Login
Login
Insights
cloud
solutions
virtualization
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
News
cloud
solutions
virtualization
digital
digital marketing
social media marketing
Finance
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
Whitepapers
Guest Blogs
cloud
All
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Master Data Management
Digital
Digital Marketing
Social Media Marketing
Finance
Cost Management
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unifed Comm
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Mixed Reality
Virtual Reality
protein solutions...
build vs. buy: customer identity and access manage...
business customer identity for saas apps — simpl...
why customer identity?...
unlocking business efficiency with customer identi...
at the forefront: c-suite priorities for value, re...
el libro electrónico de seguridad de api...
what you need to know about the eu f-gas regulatio...
powering innovation that drives human advancement...
transforming your approach to utility asset lifecy...
future-proofing supply chains with carbon data man...
getting a handle on your data...
virtual panel discussion: data monetization strate...
data flywheel: the path to business value...
future-proofing supply chains with carbon data man...
simple , rapid analysis of packaging for volatile ...
answering your 4 biggest questions about generativ...
understanding the costs of generative ai...
the top 5 generative ai questions on every executi...
7 leading generative ai use cases...
All
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Digital
Digital Marketing
Social Media Marketing
Finance
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unified Communication
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Virtual Reality
information processing language serves scalable an...
critical role of real-time operating systems in bu...
operational innovation for sustainable growth...
cloud analytics unlocking scalable business intell...
elevate your marketing with data-driven personaliz...
ai agents in business: transforming operations & d...
continuous data protection strengthening business ...
cloud encryption fortifies digital frontier for en...
b2b marketing survey: what businesses need to know...
grid computing harness distributed resources for s...
uncovering multi-threading in sales with unique st...
ai adoption framework: key components for effectiv...
machine learning use cases that deliver tangible r...
enhancing cyber resilience: a strategic approach t...
advanced encryption standard: pillar for modern da...
enhancing customer experience with data-driven ins...
customer data platforms to achieve omnichannel suc...
optimizing inbound vs. outbound lead generation fo...
elevating marketing performance with advanced mark...
secure sensitive data with privileged access manag...
All
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Digital
Digital Marketing
Social Media Marketing
Finance
Cost Management
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unified Communication
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Virtual Reality
nillion raises usd 25 m for trust-sensitive comput...
diffblue raises usd 6.3 m to enable generating uni...
elon musk’s xai to reportedly raise additional f...
openai joins forces with broadcom and tsmc to buil...
meta is planning to incorporate custom search engi...
armis raises usd 200 m round at usd 4.2b valuation...
sierra technologies raises usd 175 m at usd 4.5 b ...
concentric raises usd 45 m to enhance its ai-based...
bluesky raises usd 15 m for developer ecosystem an...
payment processing startup finix raises 75 m in fu...
informatica's blueprints for building generative a...
stripe plans to acquire bridge for stablecoin tran...
ziphq secures usd 190 m in fundings...
perplexity ai is discussing funding with investors...
ibm launches new granite models under 'permissive'...
stripe reportedly eyes to acquire bridge ventures ...
silver lake and gic plan to acquire zuora in a dea...
sam altman's worldcoin rebrands to world and unvei...
simplismart secures usd 7 m to empower enterprises...
everstage raises usd 30 m to innovate product and ...
All
IT Infra
Networking
Security
Tech
resurgence in lockbit drives record high ransomwar...
14 interesting trends that affect innovation and t...
what is web hosting?...
data privacy best practices every business should ...
Home
Whitepapers
Cyber Attack
Cyber Attack Whitepapers
ciso guide: securing cloud communication and collaboration
Sponsored by:
RingCentral
Published By:
Research Desk
Released:
Nov 20, 2023
Messaging. Video. Phone. Secured. From basic essentials to dynamic end-to-end encryption, here’s all the tech you need to protect. Explore the best and most advanced ways to prevent cyber atta...
Read more
meeting the security challenges of hybrid work
Sponsored by:
Citrix Google Alliance
Published By:
Research Desk
Released:
Mar 03, 2022
The nature of work has changed dramatically over the past two years. Organizations rapidly adopted hybrid work models, providing staff with greater freedom in where, how, and when work gets done. A...
Read more
leveraging identity data in cyber attack detection and response
Sponsored by:
Okta
Published By:
Research Desk
Released:
Feb 02, 2021
As organizations break away from traditional network-based security concepts, where zones are delegated “trusted” or “untrusted,” to people-centric security models like Zero Trust, identity is...
Read more
akamai executive summary: 2020 gartner magic quadrant for web application firewalls
Sponsored by:
Akamai
Published By:
Research Desk
Released:
Jan 20, 2021
For the fourth year in a row, Gartner has named Akamai a Leader in the 2020 Magic Quadrant Leader for web application firewalls (WAFs). This important report cites several strengths that we believe ar...
Read more
the forrester total economic impact™ of akamai security products
Sponsored by:
Akamai
Published By:
Research Desk
Released:
Jan 20, 2021
How can you meet the challenge to quantify the cost savings and business benefits of Akamai security products? To answer this question, Akamai commissioned Forrester Consulting to conduct a study in w...
Read more
making a ddos protection plan: 8 best practices
Sponsored by:
Akamai
Published By:
Research Desk
Released:
Jan 20, 2021
DDoS attackers launch hundreds of DDoS attacks every day. And when a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, whom to call or what q...
Read more
state of the internet / security: 2020 – a year in review
Sponsored by:
Akamai
Published By:
Research Desk
Released:
Jan 20, 2021
Internet traffic surged in 2020 and criminals took advantage, using their time at home to change the threat landscape forever. There were huge jumps in credential stuffing, web application, DDoS, phis...
Read more
credential stuffing attacks: what are they and how to combat them
Sponsored by:
Auth0
Published By:
Research Desk
Released:
Jan 08, 2021
Credential stuffing attacks, attempts to compromise a large number of user accounts with stolen credentials, are a difficult problem to solve. More than 80 percent of companies state it is difficult t...
Read more
stopping the attackers you trust
Sponsored by:
Illusive
Published By:
Research Desk
Released:
Nov 10, 2020
Insider threats are as much about people and process as about technology. Insiders with trusted access can operate in relative silence to inflict damage and too often malicious internal users’ activ...
Read more
how to protect privileged accounts with an incident response plan
Sponsored by:
Thycotic
Published By:
Research Desk
Released:
Oct 22, 2020
Even the most sophisticated cyber security strategy is not foolproof. You need to be ready for a cyber attack with a proactive, coordinated incident response plan. Thycotic put together an incident re...
Read more
Posts navigation
1
2
…
4
Next
Whitepapers
News
Insights
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Master Data Management
Digital
Digital Marketing
Social Media Marketing
Finance
Cost Management
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unifed Comm
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Mixed Reality
Virtual Reality
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Digital
Digital Marketing
Social Media Marketing
Finance
Cost Management
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unified Communication
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Virtual Reality
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Digital
Digital Marketing
Social Media Marketing
Finance
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unified Communication
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Virtual Reality